Search alternatives:
articles » article (Expand Search)
Showing 1,641 - 1,660 results of 64,514 for search '(articles OR partial) algorithm', query time: 0.28s Refine Results
  1. 1641

    Supporting the editing of dot maps using the spectral clustering algorithm by Dziuba Natalia, Szombara Stanisław

    Published 2025-01-01
    “…In the study, equal-size spectral clustering algorithm was used, which was modified with a function equalizing the number of points in clusters. …”
    Get full text
    Article
  2. 1642

    MGL-YOLO: A Lightweight Barcode Target Detection Algorithm by Yuanhao Qu, Fengshou Zhang

    Published 2024-11-01
    “…Experimental results show that the proposed algorithm increases MAP50 and MAP50.95 by 2.57% and 2.31%, respectively, compared to YOLOv8, while reducing parameter size and computational cost by 36.21% and 34.15%, respectively. …”
    Get full text
    Article
  3. 1643

    An efficient algorithmic framework to minimize the summand matrix in binary multiplication by Amit Verma, Manish Prateek, Shiv Naresh Shivhare, Thipendra P. Singh, Anuj Kumar, Rakesh Ranjan, Rahul Priyadarshi

    Published 2025-10-01
    “…Binary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the operand bit-length, increasing computational load, hardware usage and latency. …”
    Get full text
    Article
  4. 1644

    Underwater Object Detection Algorithm Based on an Improved YOLOv8 by Fubin Zhang, Weiye Cao, Jian Gao, Shubing Liu, Chenyang Li, Kun Song, Hongwei Wang

    Published 2024-11-01
    “…Due to the complexity and diversity of underwater environments, traditional object detection algorithms face challenges in maintaining robustness and detection accuracy when applied underwater. …”
    Get full text
    Article
  5. 1645

    Non-Profiled Partial Nibble Recovery on Power Attack Resilient Adiabatic PRESENT Block Cipher Through AI Vulnerability Assessment by Anjana Jyothi Banu, A. A.

    Published 2025-01-01
    “…Artificial Intelligence (AI) techniques, by eliminating the need for prior knowledge of cryptographic algorithms, have emerged as powerful tools for executing effective SCAs on secure implementations. …”
    Get full text
    Article
  6. 1646
  7. 1647
  8. 1648
  9. 1649
  10. 1650
  11. 1651
  12. 1652
  13. 1653
  14. 1654

    Advances in Digital Signature Algorithms: Performance, Security and Future Prospects by Lyu Shuhan

    Published 2025-01-01
    “…With the rise of online transactions and digital communications, digital signatures have become essential for verifying document integrity and authenticity across fields like finance, government, and healthcare. This article examines several important digital signature algorithms, analyzing their principles and performance. …”
    Get full text
    Article
  15. 1655
  16. 1656
  17. 1657
  18. 1658
  19. 1659

    Assessing Algorithmic Thinking Skills in Relation to Gender in Early Childhood by Kalliopi Kanaki, Michail Kalogiannakis

    Published 2022-06-01
    “…Background/purpose – In terms of computational thinking core facets, algorithmic thinking is a key competency applicable not only in Computer Science but also in aspects of daily life. …”
    Get full text
    Article
  20. 1660